• Title/Summary/Keyword: Integrity verification

Search Result 253, Processing Time 0.026 seconds

Verification of safety integrity for vital data processing device through quantitative safety analysis (정량적 안전성 분석을 통한 Vital 데이터 처리장치의 안전무결성 요구사항 검증)

  • Choi, Jin-Woo;Park, Jae-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4863-4870
    • /
    • 2015
  • Currently, as a priority to secure the safety of the railway signalling system, verification for satisfy of the safety integrity requirements(SIR) is required to the essential elements. Safety Integrity Requirements(SIR) verification is performed based on the system safety analysis. But the probability of securing basic data for system safety analysis significantly dropped because there is no experience yet performed in the country. Therefore we are had to rely on a qualitative analysis. There are methods such as qualitative risk analysis matrix, and risk graphs. The qualitative analysis is wide, the width of the accident. However, the reliability of the result is significantly less has a disadvantage. Therefore, it should be parallel quantitative safety analysis of the system/products in order to compensate for the disadvantages of the qualitative analysis. This paper presents a quantitative safety analysis method to overcome the disadvantages of the qualitative analysis. And through a result, highly reliable Safety Integrity Requirements(SIR) verification measures proposed. Verification results, the dangerous failure incidence for vital data processing device was calculated to be $1.172279{\times}10^{-9}$. The result was verified to exceed the required safety integrity targets more.

Integrity verification of VM data collected in private cloud environment and reliability verification of related forensic tools (사설 클라우드 환경에서 수집된 VM 데이터의 무결성 입증과 관련 포렌식 도구의 신뢰성 검증)

  • Kim, Deunghwa;Jang, Sanghee;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.223-230
    • /
    • 2013
  • Recently, a large number of corporations are adopting cloud solution in order to reduce IT-related costs. By the way, Digital Trace should have admissibility to be accepted as digital evidence in court, and integrity is one of the factors for admissibility. In this context, this research implemented integrity verification test to VM Data which was collected by well-known private cloud solutions such as Citrix, VMware, and MS Hyper-V. This paper suggests the effective way to verify integrity of VM data collected in private cloud computing environment based on the experiment and introduces the error that EnCase fails to mount VHD (Virtual Hard Disk) files properly.

A Study on the Verification Method for Railway System SIL (철도시스템 안전무결성레벨(SIL)의 검증방안에 대한 연구)

  • Park, Young-Soo
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.936-940
    • /
    • 2007
  • This paper is about the study on the verification method for railway system SIL which is frequency of hazard, composing Risk, one of the measurement standards for railway system safety. Frequency of hazard can be identified by using FMECA, or HAZOP, and the assessment of identified dangerous failure rate should be done by systematic methods such as FTA. Therefore, this paper provides the hazard identification level for SIL verification and the requirements necessary to verify the integrity of analysis activity.

  • PDF

A Verification Strategy for the Origin of Electronic Records (전자기록의 출처확인 지원전략)

  • Song, Byoungho
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.47-89
    • /
    • 2010
  • The target of managing electronic records should be the trusted record services to the end-users. The natural characteristics of electronic records yields the drawback in the authenticity aspect and in the integrity aspect, and current standards and methodologies have beed developed to treat this drawback. However the authenticity and the integrity concepts is hardly separated each other and too completed, so alternative "source" concept is introduced and a verification strategy for the origin of electronic records is discussed in this paper. According to this concept, current standards and methodologies may be criticized for the negligence of necessary information organizing/verification, the doubtful long-term verification, and the missing counter-strategy for the verification-failed records. To solve this, needed facters for origin verification is described, new preservation format divided into temporally-fluctuating (variable) part and immutable (fixed) part is proposed, and a strategy to prevent, avoidance, and detection/recovery important records is suggested.

A study on the vulnerability of integrity verification functions of android-based smartphone banking applications (안드로이드 스마트폰 뱅킹 앱 무결성 검증 기능의 취약점 연구)

  • Kim, Soonil;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.743-755
    • /
    • 2013
  • In recent years, the malicious apps with malicious code in normal apps are increasingly redistributed in Android market, which may incur various problems such as the leakage of authentication information and transaction information and fraudulent transactions when banking apps to process the financial transactions are exposed to such attacks. Thus the financial authorities established the laws and regulations as an countermeasures against those problems and domestic banks provide the integrity verification functions in their banking apps, yet its reliability has not been verified because the studies of the safety of the corresponding functions have seldom been conducted. Thus this study suggests the vulnerabilities of the integrity verification functions of banking apps by using Android reverse engineering analysis techniques. In case the suggested vulnerabilities are exploited, the integrity verification functions of banking apps are likely to be bypassed, which will facilitate malicious code inserting attacks through repackaging and its risk is very high as proved in a test of this study. Furthermore this study suggests the specific solutions to those vulnerabilities, which will contribute to improving the security level of smartphone financial transaction environment against the application forgery attacks.

Suggestions for Solving Errors and Integrity Guarantees in the Process of Transferring Standard Electronic Documents (표준 전자문서 이관 시 발생하는 무결성 보장 및 오류 해결에 대한 제언)

  • Yu, Young-Moon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.3
    • /
    • pp.1-21
    • /
    • 2020
  • Although the National Archives of Korea has been receiving transfer of standard electronic documents with a retention period of more than 30 years from the central administration since 2015, errors and inefficiencies persist. Despite this, however, there remain no studies that analyze or address these issues. This study aims to bridge this gap and found that most errors in the transfer process occur at the production stage. To address such, this study proposes a four-step solution. First, before electronic document approval, the text and attached files are checked for defects to prevent errors. Second, as soon as the signature is made, digital signatures are applied on a file-by-file basis to ensure integrity. Third, integrity verification and transfer inspection are automatically performed through digital signature investigation and defect check procedure during transfer and preservation. Fourth and last, the criteria of acquiring records and integrity guarantee technologies are properly applied in production stage with proper management and supervision.

Using Model Checking to Verify an Automotive Electric Parking Brake System (자동차 전자식 주차 브레이크 시스템 안전 요구사항 검증을 위한 모델검증 적용)

  • Choi, Jun Yeol;Cho, Joon Hyung;Choi, Yun Ja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.4
    • /
    • pp.167-176
    • /
    • 2017
  • There are increasing policies and safeguards to prevent various human resource losses with the development of automotive industry. Currently ISO26262 $1^{st}$ edition has been released in 2011 to ensure functional safety of electrical and electronic systems and the $2^{nd}$ edition will be released in the second half of 2016 as part of a trend. The E/E (Electrical & Electronics) system requirements verification is required through walk-through, 인스펙션, semi-formal verification and formal verification in ISO 26262. This paper describe the efficiency of model checking for the E/E system requirements verification by applying the product development project of ASIL (Automotive Safety Integrity Level) D for the electrical parking brake system.

Dilution of Precision (DOP) Based Landmark Exclusion Method for Evaluating Integrity Risk of LiDAR-based Navigation Systems

  • Choi, Pil Hun;Lee, Jinsil;Lee, Jiyun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.3
    • /
    • pp.285-292
    • /
    • 2020
  • This paper introduces a new computational efficient Dilution of Precision (DOP)-based landmark exclusion method while ensuring the safety of the LiDAR-based navigation system that uses an innovation-based Nearest-Neighbor (NN) Data Association (DA) process. The NN DA process finds a correct landmark association hypothesis among all potential landmark permutations using Kalman filter innovation vectors. This makes the computational load increases exponentially as the number of landmarks increases. In this paper, we thus exclude landmarks by introducing DOP that quantifies the geometric distribution of landmarks as a way to minimize the loss of integrity performance that can occur by reducing landmarks. The number of landmarks to be excluded is set as the maximum number that can satisfy the integrity risk requirement. For the verification of the method, we developed a simulator that can analyze integrity risk according to the landmark number and its geometric distribution. Based on the simulation, we analyzed the relationship between DOP and integrity risk of the DA process by excluding each landmark. The results showed a tendency to minimize the loss of integrity performance when excluding landmarks with poor DOP. The developed method opens the possibility of assuring the safety risk of the Lidar-based navigation system in real-time applications by reducing a substantial amount of computational load.

Experimental Characterization-Based Signal Integrity Verification of Sub-Micron VLSI Interconnects

  • Eo, Yung-Seon;Park, Young-Jun;Kim, Yong-Ju;Jeong, Ju-Young;Kwon, Oh-Kyong
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.5
    • /
    • pp.17-26
    • /
    • 1997
  • Interconnect characterization on a wafer level was performed. Test patterns for single, two-coupled, and triple-coupled lines ere designed by using 0.5$\mu\textrm{m}$ CMOS process. Then interconnect capacitances and resistances were experimentally extracted by using tow port network measurements, Particularly to eliminate parasitic effects, the Y-parameter de-embedding was performed with specially designed de-embedding patterns. Also, for the purpose of comparisons, capacitance matrices were calculated by using the existing CAD model and field-solver-based commercial simulator, METAL and MEDICI. This work experimentally verifies that existing CAD models or parameter extraction may have large deviation from real values. The signal transient simulation with the experimental data and other methodologies such as field-solver-based simulation and existing model was performed. as expected, the significantly affect on the signal delay and crosstalk. The signal delay due to interconnects dominates the sub-micron-based a gate delay (e.g., inverter). Particularly, coupling capacitance deviation is so large (about more than 45% in the worst case) that signal integrity cannot e guaranteed with the existing methodologies. The characterization methodologies of this paper can be very usefully employed for the signal integrity verification or he electrical design rule establishments of IC interconnects in the industry.

  • PDF

Benford's Law and its Potential for Data Verification in Ecological Monitoring

  • Tae-Jun Choi;Woong-Bae Park;Dae-Hee Kim;Dohee Lee;Yuno Do
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.5 no.2
    • /
    • pp.43-49
    • /
    • 2024
  • Ecological monitoring provides indispensable data for biodiversity conservation and sustainable resource management. However, the complexity and variability inherent in ecological monitoring data necessitate robust verification processes to ensure data integrity. This study employed Benford's Law, a statistical principle traditionally used in fields such as finance and health sciences, to evaluate the authenticity of ecological monitoring data related to the abundance of migratory bird species across various locations in South Korea. Benford's Law anticipates a specific logarithmic distribution of leading digits in naturally occurring numerical datasets. Our investigation involved two stages of analysis: a first-order analysis considering the leading digit and a second-order analysis examining the first two digits of bird population counts. While the first-order analysis displayed moderate conformity to Benford's Law that suggested overall data integrity, the second-order analysis revealed more pronounced deviations, indicating potential inconsistencies or inaccuracies in certain subsets of the data. Although our data did not perfectly align with Benford's Law, these deviations underscore the complex nature of ecological research, which is influenced by a multitude of environmental, methodological, and human factors.